• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
3rd September 2019

Automating Website Deployments Through Buddy

Automating Website Deployments Through Buddy Automating Website Deployments Through Buddy Leonardo Losoviz 2019-09-03T12:30:00+02:00 2019-09-03T15:37:19+00:00 (This is a sponsored article.) Managing the deployment of a website used to be easy: It simply involved uploading files to the server through FTP...

Read more
0 comment

3rd September 2019

What is MITRE ATT&CK and how is it useful?

An introduction to the MITRE ATT&CK framework and how it can help organize and classify various types of threats and adversarial behaviors. The post What is MITRE ATT&CK and how is it useful? appeared first on WeLiveSecurity Sourced from...

Read more
0 comment

7th February 2019

How To Architect A Complex Web Table

How To Architect A Complex Web Table How To Architect A Complex Web Table Slava Shestopalov 2019-02-06T13:00:00+01:00 2019-02-07T09:55:19+00:00 Imagine you design a system for data researchers. Or an application for energy management. Or a dashboard for corn traders. Maybe...

Read more
0 comment

7th February 2019

Google rolls out Chrome extension to warn you about compromised logins

The new tool aims to help in an age when billions of login credentials are floating around the internet The post Google rolls out Chrome extension to warn you about compromised logins appeared first on WeLiveSecurity Sourced from Tomáš...

Read more
0 comment

1st February 2019

Using Vue.js To Create An Interactive Weather Dashboard With APIs

Using Vue.js To Create An Interactive Weather Dashboard With APIs Using Vue.js To Create An Interactive Weather Dashboard With APIs Souvik Sarkar 2019-02-01T13:00:18+01:00 2019-02-01T11:48:39+00:00 (This is a sponsored article.) In this tutorial, you will build a simple weather dashboard...

Read more
0 comment

1st February 2019

Japan to probe citizens’ IoT devices in the name of security

Smart devices were targeted by more than one-half of cyberattacks detected in the country in 2017 The post Japan to probe citizens’ IoT devices in the name of security appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

31st January 2019

Adobe Experience Manager vs. WordPress: The Authoring Experience Compared

Adobe Experience Manager vs. WordPress: The Authoring Experience Compared Adobe Experience Manager vs. WordPress: The Authoring Experience Compared Kevin Weber 2019-01-30T13:45:55+01:00 2019-01-30T17:20:05+00:00 Thanks, WordPress and Gutenberg, for making block-based editing the standard for authoring web pages. In this article,...

Read more
0 comment

31st January 2019

‘We’re coming for you’, global police warn DDoS attack buyers

First closing in on operators, now on users, as the hunt continues and law enforcement in many countries is about to swoop down on people who bought DDoS attacks on WebStresser The post ‘We’re coming for you’, global police...

Read more
0 comment

29th January 2019

Understanding API-Based Platforms: A Guide For Product Managers

Understanding API-Based Platforms: A Guide For Product Managers Understanding API-Based Platforms: A Guide For Product Managers Michał Sędzielewski 2019-01-29T13:00:57+01:00 2019-01-29T21:04:53+00:00 To build a digital product today is to integrate the myriad of various back-office systems with customer touchpoints and...

Read more
0 comment

29th January 2019

Apple takes Group FaceTime offline after discovery of spying bug

The company is rushing to fix a glitch that may let other iPhone users hear and see you – before you answer the call The post Apple takes Group FaceTime offline after discovery of spying bug appeared first on...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

20 January,2021 How To Build A Node.js API For Ethereum Blockchain
20 January,2021 FBI warns of voice phishing attacks stealing corporate credentials
19 January,2021 Using Grommet In React Applications
19 January,2021 WhatsApp delays privacy policy update after confusion, backlash
18 January,2021 CES 2021: Router swarms invade your home (and know where you are)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net